Linksys WCG200 Ug 30811A User Manual To The 37ad7f1e Fca2 449c A1f7 Fcf1c09fcfa6
Wcg200 Ug WCG200_ug WCG200_ug userguide s s.linksys.com 3:
User Manual: Linksys WCG200 to the manual
Open the PDF directly: View PDF .
Page Count: 47
Download | |
Open PDF In Browser | View PDF |
Wireless-G Cable Gateway Use this guide to install the following product: WCG200 User Guide COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2003 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders. FCC STATEMENT This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used according to the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which is found by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: • • • • Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver's Consult a dealer or an experienced radio/TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator and your body. INDUSTRY CANADA (CANADA) This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. The use of this device in a system operating either partially or completely outdoors may require the user to obtain a license for the system according to the Canadian regulations. EC DECLARATION OF CONFORMITY (EUROPE) Linksys declares that the Wireless-G Cable Gateway conforms to the specifications listed below, following the provisions of the European R&TTE directive 1999/5/EC: • EN 301 489-1, 301 489-17 General EMC requirements for Radio equipment. • EN 609 50 Safety • EN 300-328-1, EN 300-328-2 Technical requirements for Radio equipment. Caution: This equipment is intended to be used in all EU and EFTA countries. Outdoor use may be restricted to certain frequencies and/or may require a license for operation. Contact local Authority for procedure to follow. Note: Combinations of power levels and antennas resulting in a radiated power level of above 100 mW equivalent isotropic radiated power (EIRP) are considered as not compliant with the above mentioned directive and are not allowed for use within the European community and countries that have adopted the European R&TTE directive 1999/5/EC. UG-WCG200-31021B-BW For more details on legal combinations of power levels and antennas, contact Linksys Corporate Compliance. • Linksys vakuuttaa täten että Wireless-G Cable Gateway conforms to the tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien näiden direktiivien muiden ehtojen mukainen. • Linksys Group déclare la Wireless-G Cable Gateway conforms to the est conforme aux conditions essentielles et aux dispositions relatives à la directive 1999/5/EC. • Belgique: Dans le cas d'une utilisation privée, à l'extérieur d'un bâtiment, au-dessus d'un espace public, aucun enregistrement n'est nécessaire pour une distance de moins de 300m. Pour une distance supérieure à 300m un enregistrement auprès de l'IBPT est requise. Pour une utilisation publique à l'extérieur de bâtiments, une licence de l'IBPT est requise. Pour les enregistrements et licences, veuillez contacter l'IBPT. • France: 2.4 GHz Bande : les canaux 10, 11, 12, 13 (2457, 2462, 2467, et 2472 MHz respectivement) sont complétement libres d'utilisation en France (en utilisation intérieur). Pour ce qui est des autres canaux, ils peuvent être soumis à autorisation selon le départment. L'utilisation en extérieur est soumis à autorisation préalable et très restreint. Vous pouvez contacter l'Autorité de Régulation des Télécommunications (http://www.art-telecom.fr) pour de plus amples renseignements. Wireless-G Cable Gateway Table of Contents Chapter 1: Introduction The Linksys Cable Gateway Features An Introduction to LANs and WANs IP Addresses Network Setup Overview 1 1 1 2 2 4 Chapter 2: Getting to Know the Cable Gateway The Cable Gateway’s Back Panel Ports The Reset Button Rebooting the Cable Gateway The Cable Gateway’s Front Panel LEDs The USB Icon USB Cabling 5 5 6 6 6 8 8 Chapter 3: Connecting the Cable Gateway Overview Ethernet Port Connection USB Port Connection Installing the USB Driver for Windows 98 Installing the USB Driver for Windows Millenium Installing the USB Driver for Windows 2000 Installing the USB Driver for Windows XP D 9 9 9 11 13 15 17 20 Chapter 4: Configuring the PCs Overview Windows 95, Windows 98, Windows Me Windows 2000 Windows XP 22 22 22 24 26 Chapter 5: Using the Cable Gateway’s Web-based Utility Assessing the Web-Based Utility The Setup Tab The Wireless Tab The Security Tabs The Access Restriction Tabs The Applications & Gaming Tabs The Administration Tabs The Status Tabs 28 28 29 31 38 40 44 48 57 Wireless-G Cable Gateway Chapter 1: Introduction Appendix A: Troubleshooting Common Problems and Solutions Frequently Asked Questions 54 54 55 Appendix B: Configuring Wireless Security in Windows XP 59 Appendix C: Installing the TCP/IP Protocol 65 Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter 67 Appendix E: Glossary 71 Appendix F: Specifications Environmental 82 83 Appendix G: Warranty Information 84 Appendix H: Contact Information 85 The Linksys Cable Gateway The Linksys Wireless-G Cable Gateway is the all-in-one solution for Internet connectivity in your home. The Cable Modem function gives you a blazing fast connection to the Internet, far faster than a dial-up, and without tying up your phone line. Connect your computer to the Wireless-G Cable Gateway via USB, or take advantage of the built-in 4-port 10/100 Ethernet Switch to jump start your home network. You can share files, printers, hard drive space and other resources, or play head-to-head PC games. Connect four PCs directly, or daisy-chain out to more hubs and switches to create as big a network as you need. The built-in Wireless-G Access Point allows up to 32 wireless devices to connect to your network at a blazing 54Mbps, without running cables through the house. It's also compatible with Wireless-B devices, at 11Mbps. The Gateway's Router function ties it all together and lets your whole network share that high-speed Internet connection. To protect your data and privacy, the Wireless-G Cable Gateway features an advanced firewall to keep Internet intruders and attackers out. Wireless transmissions can be protected by powerful data encryption. Safeguard your family with Parental Control features like Internet Access Time Limits and Key Word Blocking. Configuration is a snap with any web browser. With the Linksys Wireless-G Cable Gateway at the heart of your home network, you're connected to the future. Features • High-speed DOCSIS 2.0-ready Cable Modem gives you a fast, "Always On" connection to the Internet • Connect via USB, or use the built-in Router and 4-port Switch to jump start your Ethernet network and share the Internet throughout your household • Built-in Wireless-G (802.11g) Access Point also lets you connect without running wires • Advanced firewall and security features protect your PCs, your data, and your family • Supports VPN Pass-Through for IPSec and PPTP Protocols • Internal 4-Port Switch Dramatically Speeds Up Your Network • DHCP Server Capability to Assign IP Addresses Automatically F 1 Wireless-G Cable Gateway An Introduction to LANs and WANs Simply put, a router is a network device that connects two networks together. The Cable Gateway has a built-in router that connects your Local Area Network (LAN), which is the group of PCs in your home or office, to the Wide Area Network (WAN), which is the Internet. The Cable Gateway processes and regulates the data that travels between these two networks. Think of the Cable Gateway as a network device with two sides: the first side is made up of your private Local Area Network (LAN) of PCs. The other, public side, is the Internet, or the Wide Area Network (WAN), outside of your home or office. The Cable Gateway’s firewall protects your network of PCs so users on the public, Internet side cannot “see” your PCs. This is how your local network remains private. The Cable Gateway protects your network by inspecting the first packet coming in through the WAN port before delivery to the final destination in the local network. The Cable Gateway inspects Internet port services like the web server, ftp server, or other Internet applications, and, if allowed, will forward the packet to the appropriate PC on the LAN side. IP Addresses What’s an IP Address? IP stands for Internet Protocol. Every device on an IP-based network, including PCs, print servers, and routers, requires an IP address to identify its “location,” or address, on the network. This applies to both the WAN and LAN connections. There are two ways of assigning an IP address to your network devices. Static IP Addresses A static IP address is a fixed IP address that you assign manually to a PC or other device on the network. Since a static IP address remains valid until you disable it, static IP addressing ensures that the device assigned it will always have that same IP address until you change it. Static IP addresses are commonly used with network devices such as server PCs or print servers. 2 Dynamic IP Addresses A dynamic IP address is automatically assigned to a device on the network, such as PCs and print servers. These IP addresses are called “dynamic” because they are only temporarily assigned to the PC or device. After a certain time period, they expire and may change. If a PC logs onto the network (or the Internet) and its dynamic IP address has expired, the DHCP server will assign it a new dynamic IP address. DHCP (Dynamic Host Configuration Protocol) Servers DHCP frees you from having to assign IP addresses manually every time a new user is added to your network. PCs and other network devices using dynamic IP addressing are assigned a new IP address by a DHCP server. The PC or network device obtaining an IP address is called the DHCP client. By default, the Cable Gateway’s WAN setting is DHCP client. A DHCP server can either be a designated PC on the network or another network device, such as the Cable Gateway. By default, the Cable Gateway acts as a DHCP server for your local network. If you already have a DHCP server running on your network, you must disable that DHCP server or the Cable Gateway’s DHCP’s feature. If you run more than one DHCP server on your network, you will experience network errors, such as conflicting IP addresses. Note: Even if you assign a static IP address to a PC, other PCs can still use DHCP’s dynamic IP addressing, as long as the static IP address is not within the DHCP range of the LAN IP Address. If the Cable Gateway’s DHCP feature fails to provide a dynamic IP address, refer to “Appendix A: Troubleshooting.” Note: Since the Cable Gateway is a device that connects two networks, it needs two IP addresses—one for the LAN side, and one for the WAN side. In this User Guide, you’ll see references to the “WAN IP address” and the “LAN IP address.” Since the Cable Gateway has firewall security, the only IP address on your network that can be seen from the Internet is the Cable Gateway’s WAN IP address. 3 Wireless-G Cable Gateway Network Setup Overview This user guide covers the basic steps for setting up a network with the Cable Gateway. After going through the Chapter 2: Getting to Know the Cable Gateway, proceed through the following chapters: • Chapter 3: Connecting the Cable Gateway This chapter instructs you on how to connect the coaxial Cable line to the Cable Gateway and connect the PC(s) to the Cable Gateway. Chapter 2: Getting to Know the Cable Gateway The Cable Gateway’s Back Panel Ports The Cable Gateway’s ports are located on the back panel of the Cable Gateway, as shown in Figure 2-1. • Chapter 4: Configuring the PCs This chapter instructs you on how to configure your PC(s) for a DHCP connection, if the network settings are not already set to DHCP. • Chapter 5: Using the Cable Gateway’s Web-based Utility This chapter explains how to configure the Cable Gateway for wireless networking using your web browser and the Cable Gateway’s web-based utility. When you’re finished with the basic steps, you are ready to connect to the Internet through your new network. An example of such a network is shown in Figure 1-1. Figure 2-1 On/Off Switch This switch is used for turning the Cable Gateway on and off. Power The Power port is where you will connect the power adapter. Reset Press this button to restore the Cable Gateway to it factory default settings. USB This is where you can use a USB cable to connect a Windows-based to the Cable Gateway. Ports 1-4 These four ports are used to connect network devices, such as PCs, print servers, and remote hard drives to your local area network (LAN). Cable The Cable port is where you will connect your coaxial Cable line. Notebook with Ethernet Adapter WAN LAN PC with Ethernet Adapter Wireless-G Cable Gateway Figure 1-1 4 5 Wireless-G Cable Gateway The Reset Button Pressing the Reset Button and holding it in for a few seconds will clear all of the Cable Gateway’s data and restore the factory defaults. This should be done only if you are experiencing networking problems and have exhausted all of the other troubleshooting options. By resetting the Cable Gateway, you run the risk of creating conflicts between your PCs’ actual IP Addresses and what the Cable Gateway thinks the IP Addresses of the PCs should be. You may be forced to reboot each network PC. The Cable Gateway’s Front Panel LEDs Figure 2-2 Power Green or red. The Green Power LED is solid when the Cable Gateway is powered on. If the LED lights up red, there is an error. Internet - Cable Green. The Green LED will go through a series of flashes as the Cable Gateway goes through its startup and registration process. It will remain solid when registration is complete and the Cable Gateway is operational. Internet -Activity Green. This LED flashes when data is being sent or received through the cable Gateway interface. Ethernet-1-4 Green or red. Ethernet 1-4 LED serves multiple purposes. If the LED is solid green, the Cable Gateway is successfully connected to a device through the corresponding port (1, 2, 3, or 4). If the LED is flashing green, the Cable Gateway is actively sending or receiving data over that port. If the LED lights up red, there is a collision. USB Green or red. The LED is solid green when a PC is connected to the Cable Gateway via USB, and drivers are installed. If the LED flashes red, the cable is connected, but the driver isn’t loaded. Wireless Green or red. The LED flashes green during wireless activity. If the LED flashes red, there is an error condition. Rebooting the Cable Gateway You should only reboot the Cable Gateway after all other troubleshooting methods have been exhausted but before calling Linksys Technical Support. There are two ways to reboot the Cable Gateway: 1) Turn the Cable Gateway’s power off for a few seconds and power it back on again. 2) Unplug the Cable Gateway’s power adapter and plug it back in again. Rebooting the Cable Gateway may cause conflicts with IP Addresses. Proceed to “Chapter 3: Connecting the Cable Gateway.” 6 7 Wireless-G Cable Gateway The USB Icon The USB icon, shown in Figure 2-3, marks a USB port on a PC or device. Chapter 3: Connecting the Cable Gateway Overview Figure 2-3 You will connect the Cable Gateway to your Cable service’s coaxial cable line and to the computers in your home or business. With the Cable Gateway, you can use a standard Ethernet connection or connect via USB. For Ethernet connection continue with the Ethernet Cable Connection section. For USB connection, go to the next section, USB Cable Connection. The Cable Gateway comes with one USB cable. Connect one end of the USB cable to the Cable Gateway. Connect the other end to a computer’s USB port. Ethernet Port Connection First, make sure that all the devices that you’ll be working with are powered down, including your PCs and the Cable Gateway. USB Cabling The picture shows two USB ports as they might appear on your computer. Note the two USB icons marking the ports. Figure 5-2 Figure 3-1 1. Connect the coaxial cable that is provided by your cable service provider to the Cable port that is on the back of the Cable Gateway, as shown in Figure 3-1. Figure 3-2 2. Connect one end of an Ethernet cable to your PC’s Ethernet adapter, as shown in Figure 3-2. Note: If your PC’s Ethernet adapter is not set up, please refer to the Ethernet adapter’s user guide for more information. 8 9 Wireless-G Cable Gateway 3. Connect the other end of the cable to one of the LAN ports on the back of the Cable Gateway, as shown in Figure 3-3. USB Port Connection First, make sure that all the devices that you’ll be working with are powered down, including your PCs and the Cable Gateway. Figure 3-3 Make sure there is an Ethernet cable connected from the Cable Gateway to every PC that you want on your local network. If you are connecting more than four PCs to the Cable Gateway via Ethernet, you will also need to connect a hub or switch to the Cable Gateway. 4. Connect the power adapter to the Cable Gateway, as shown in Figure 3-4. Plug the other end of the power adapter into the electrical outlet, preferably a surge protector. Figure 3-4 1. Connect the coaxial cable that is provided by your cable service provider to the Cable port that is on the back of the Cable Gateway, as shown in Figure 3-4. 2. Connect one end of a USB cable to your PC’s USB port and connect the other end of the USB cable to the USB port on the back of the Cable Gateway, as shown in Figure 3-4. 5. Turn on the Cable Gateway. Figure 3-4 6. Contact your Cable ISP to activate your account. Your Cable ISP will need what is called a MAC Address for the cable modem capability of your Cable Gateway in order to set up your account. The 12-digit modem MAC address is printed on a bar code label on the bottom of the Cable Gateway. Once you have given them this number, your Cable ISP should be able to activate your account. 7. Then, turn on the first PC that you want to use to configure the Cable Gateway. Important: Make sure to contact your ISP with your MAC Address to activate your account. Go to “Chapter 4: Configuring the PCs.” 3. Connect the power adapter to the Cable Gateway, as shown in Figure 3-5. Plug the other end of the power adapter into the electrical outlet, preferably a surge protector. 4. Turn on the Cable Gateway. Then, turn on your PC. Figure 3-5 5. During the boot up process, your computer should recognize the device and ask for driver installation. 6. Next, you will need to install the USB Driver. Continue to the section for your operating system. Return to step 7 after the driver installation. 7. Contact your Cable ISP to activate your account. Your Cable ISP will need what is called a MAC Address for the cable modem capability of your Cable Gateway in order to set up your account. The 12-digit MAC address is printed on a bar code label on the bottom of the Cable Gateway. Once you have given them this number, your ISP should be able to activate your account. Important: Make sure to contact your ISP with your MAC Address to activate your account. Go to “Chapter 4: Configuring the PCs.” 10 11 Wireless-G Cable Gateway Installing the USB Driver for Windows 98 3. Select CD-ROM drive as the only location where Windows will search for the driver software and click the Next button. 1. When the Add New Hardware Wizard window appears, insert the Setup CD into your CD-ROM drive and click Next. Figure 3-3 Figure 3-1 2. Select Search for the best driver for your device and click the Next button. Figure 3-2 12 4. Windows will notify you that it has identified the appropriate driver and is ready to install it. Click the Next button. Figure 3-4 13 Wireless-G Cable Gateway 5. Windows will begin installing the driver for the modem. At this point, the installation may require files from your Windows 98 CD-ROM. If prompted, insert your Windows 98 CD-ROM into your CD-ROM drive and enter d:\win98 in the box that appears (where “d” is the letter of your CD-ROM drive). If you were not supplied with a Windows 98 CD-ROM, your Windows files may have been placed on your hard drive by your computer manufacturer. While the location of these files may vary, many manufacturers use c:\windows\options\cabs as the path. Try entering this path into the box. If no files are found, check your computer’s documentation or contact your computer manufacturer for more information. 6. After Windows has completed installing this driver, click Finish. Installing the USB Driver for Windows Millennium 1. Start up your PC in Windows Millennium. Windows will detect new hardware connected to your PC. Figure 3-6 2. Insert the Setup CD into your CD-ROM drive. When Windows asks you for the location of the best driver, select Automatic search for a better driver (Recommended) and click the Next button. Figure 3-5 7. When asked if you want to restart your PC, remove all diskettes and CDROMs from the PC and click Yes. If Windows does not ask you to restart your PC, click the Start button, choose Shut Down, choose Restart, then click Yes. The Windows 98 driver installation is complete. Return to the section on the USB Port Connection to finish the setup. 14 Figure 3-7 3. Windows will begin installing the driver for the modem. At this point, the installation may require files from your Windows Millennium CD-ROM. If prompted, insert your Windows Millennium CD-ROM into your CD-ROM drive and enter d:\win9x in the box that appears (where “d” is the letter of your CD-ROM drive). If you were not supplied with a Windows CD-ROM, your Windows files may have been placed on your hard drive by your computer manufacturer. While the location of these files may vary, 15 Wireless-G Cable Gateway many manufacturers use c:\windows\options\install as the path. Try entering this path into the box. If no files are found, check your computer’s documentation or contact your computer manufacturer for more information. Installing the USB Driver for Windows 2000 1. Start up your PC. Windows will notify you that it has detected new hardware. Insert the Setup CD into the CD-ROM drive. 4. When Windows finishes installing the driver, click Finish. Figure 3-10 2. When the Found New Hardware Wizard screen appears to confirm that the USB Modem has been identified by your PC, make sure the Setup CD is in the CD-ROM drive and click Next. Figure 3-8 5. When asked if you want to restart your PC, remove all diskettes and CDROMs from the PC and click Yes. If Windows does not ask you to restart your PC, click the Start button, choose Shut Down, choose Restart, then click Yes. Figure 3-11 Figure 3-9 The Windows Millennium driver installation is complete. Return to the section on the USB Port Connection to finish the setup. 16 17 Wireless-G Cable Gateway 3. Select Search for a suitable driver for my device and click the Next button. 5. Windows will notify you that it has located the appropriate driver and is ready to install it. Click the Next button. Figure 3-14 Figure 3-12 4. Windows will now search for the driver software. Select only CD-ROM drives and click the Next button. 6. When Windows has completed installing the driver, click Finish. Figure 3-15 Figure 3-13 18 The Windows 2000 driver installation is complete. Return to the section on the USB Port Connection to finish the setup. 19 Wireless-G Cable Gateway Installing the USB Driver for Windows XP 3. Windows will now search for the driver software. Click the Next button. 1. Start up your PC. Windows will notify you that it has detected new hardware. Insert the Setup CD into the CD-ROM drive. Figure 3-16 2. When the Found New Hardware Wizard screen appears to confirm that the USB Modem has been identified by your PC, make sure that the Setup CD is in the CD-ROM drive and click Next. Figure 3-18 4. When Windows has completed installing the driver, click Finish. Figure 3-17 Figure 3-19 The Windows XP driver installation is complete. Return to the section on the USB Port Connection to finish the setup. 20 21 Wireless-G Cable Gateway Chapter 4: Configuring the PCs Overview The instructions in this chapter will help you configure each of your computers to be able to communicate with the Cable Gateway. To do this, you need to configure your PC’s network settings to obtain an IP (or TCP/IP) address automatically (called DHCP). Computers use IP addresses to communicate with each other across a local network or the Internet. You will need to know which operating system your computer is running, such as Windows 95, 98, Me, 2000, or XP. One way to find out which operating system you have is by clicking the Start button and selecting the Settings option. Then, open the Control Panel, and double-click the System icon. The screen that appears should display your operating system. 2. On the Configuration tab, select the TCP/IP line for the applicable Ethernet adapter, as shown in Figure 4-1. Do not choose a TCP/IP entry whose name mentions DUN, PPPoE, VPN, or AOL. If the word TCP/IP appears by itself, select that line. (If there is no TCP/IP line listed, refer to “Appendix C: Installing the TCP/IP Protocol” or your Ethernet adapter’s documentation to install TCP/IP now.) Click the Properties button. You may need to configure each computer you are connecting to the Cable Gateway. The next few pages show you, step by step, how to configure your network settings based on the type of Windows operating system you are using. If your operating system is not referenced here, refer to your operating system’s documentation. Figure 4-1 3. Click the IP Address tab. Select Obtain an IP address automatically, as shown in Figure 4-2. Once you've configured your computers, continue to “Chapter 5: Using the Cable Gateway’s Web-based Utility.” Windows 95, 98, and Me 1. Go to the Network screen. Do this by clicking the Start button, selecting Settings and opening the Control Panel. From there, double-click the Network icon. Figure 4-2 22 23 Wireless-G Cable Gateway 4. Now click the Gateway tab to ensure that the Installed Gateway field is left blank. Click the OK button. 4. Select Internet Protocol (TCP/IP), as shown in Figure 4-4, and click the Properties button. 5. Click the OK button again. Windows may ask you for the original Windows installation disk or additional files. Supply them by pointing to the correct file location, e.g., D:\win98, D:\win9x, c:\windows\options\cabs, etc. (if “D” is the letter of your CD-ROM drive). 6. Windows may ask you to restart your PC. Click the Yes button. If Windows does not ask you to restart, restart your computer anyway. Go to “Chapter 5: Using the Cable Gateway’s Web-based Utility.” Windows 2000 1. Go to the Network screen by clicking the Start button. Click Settings and then Control Panel. From there, double-click the Network and Dial-up Connections icon. 2. Select the Local Area Connection icon for the applicable Ethernet adapter (usually it is the first Local Area Connection listed). Do not choose a TCP/IP entry whose name mentions DUN, PPPoE, VPN, or AOL. Doubleclick the Local Area Connection. Figure 4-4 5. Select Obtain an IP address automatically, as shown in Figure 4-5. Once the new window appears, click the OK button. Click the OK button again to complete the PC configuration. 3. The Local Area Connection Status screen will appear, as shown in Figure 4-3. Click the Properties button. Figure 4-5 6. Restart your computer. Go to “Chapter 5: Using the Cable Gateway’s Web-based Utility.” Figure 4-3 24 25 Wireless-G Cable Gateway Windows XP 4. Select Internet Protocol (TCP/IP), and click the Properties button. The following instructions assume you are running Windows XP with the default interface. If you are using the Classic interface (where the icons and menus look like previous Windows versions), please follow the instructions for Windows 2000. 1. Open the Network screen. To do this, click the Start button and select the Control Panel. From there, click the Network and Internet Connections icon, followed by the Network Connections icon. 2. Select the Local Area Connection icon for the applicable Ethernet adapter (usually it is the first Local Area Connection listed). Double-click the Local Area Connection and click the Properties button. Figure 4-7 5. Select Obtain an IP address automatically. Once the new window appears, click the OK button. Click the OK button again (or the Close button if any settings were changed) to complete the PC configuration. Figure 4-8 Figure 4-6 3. The Local Area Connection Status screen will appear. Click the Properties button. 6. Restart your computer. Go to “Chapter 5: Using the Cable Gateway’s Web-based Utility”. 26 27 Wireless-G Cable Gateway Chapter 5: Using the Cable Gateway’s Web-based Utility Accessing the Web-Based Utility The Setup The Setup Tab The first screen that appears is the Setup tab. This tab allows you to change the Router's general settings. Change these settings as described here and click the Save Settings button to save your changes or Cancel Changes to cancel your changes. For your convenience, an administrative utility has been programmed into the Cable Gateway. From this browser-based utility, you can view the Cable Gateway’s current status and, when wireless functions are enabled, administer the wireless settings. This chapter explains all of the functions in this utility. 1. Open your web browser, and enter 192.168.0.1 into the web browser’s Address field, as shown in Figure 5-1. Then, press the Enter key. 2. An Enter Network Password window, similar to that shown in Figure 5-2, appears. Leave the User Name field empty, and enter admin (the default password) in lowercase letters in the Password field. Then, click the OK button. Don’t check the box next Remember my password,, because you should change the password for better network security. Figure 5-1 Figure 5-3 Figure 5-2 There are seven main tabs: Setup, Wireless, Security, Access Restrictions, Applications & Gaming, Administration, and Status. Additional tabs are available after you click the main tabs. Important: Some functions may be changed or removed depending on your Internet Service Provider. 28 Internet Setup Internet Connection Type. The Router supports two connection types: Obtain IP Address Automatically (DHCP) (the default connection type), and Set Static IP Manually. Select the type that is supported by your ISP. IP Address. This is the Router’s IP address, when seen from the WAN, or the Internet. Your ISP will provide you with the IP Address you need to specify here. Subnet Mask. This is the Router’s Subnet Mask, as seen by external users on the Internet (including your ISP). Your ISP will provide you with the Subnet Mask. Default Gateway. Your ISP will provide you with the Default Gateway Address, which is the ISP server’s IP address. 29 Wireless-G Cable Gateway Primary DNS. (Required) and Secondary DNS (Optional). Your ISP will provide you with at least one DNS (Domain Name System) Server IP Address. The Wireless Tab Optional Settings (required by some ISPs) Host Name and Domain Name. These fields allow you to supply a host and domain name for the Router. Some ISPs require these names as identification. You may have to check with your ISP to see if your broadband Internet service has been configured with a host and domain name. In most cases, leaving these fields blank will work. Network Setup Gateway IP. The values for the Router’s Local IP Address is shown here. In most cases, keeping the default value will work. Local IP Address The default value is 192.168.0.1. Network Address Server Settings (DHCP) A Dynamic Host Configuration Protocol (DHCP) server automatically assigns an IP address to each PC on your network for you. Unless you already have one, it is highly recommended that you leave the Router enabled as a DHCP server. Local DHCP Server. DHCP is already enabled by factory default. If you already have a DHCP server on your network, set the Router’s DHCP option to Disable. If you disable DHCP, remember to assign a static IP address to the Router. Start IP Address. Enter a value for the DHCP server to start with when issuing IP addresses. This value must be 192.168.0.2 or greater, because the default IP address for the Router is 192.168.0.1. Number of Address (Optional). Enter the maximum number of PCs that you want the DHCP server to assign IP addresses to. This number cannot be greater than 253. In order to determine the DHCP IP Address range, add the starting IP address (e.g., 10) to the number of DHCP users. By default, as shown in Figure 5-3, add 10 to 245 and subtract 1, and the range is 192.168.0.1o to 192.168.0.254. DHCP Address Range. The range of DHCP addresses is displayed here. Time Setting. This is where you set the time for your Router. You can set it manually or automatically. To save your changes on this page, click the Save Settings button. To cancel any unsaved changes on this page, click the Cancel Changes button. 30 Figure 5-4 Basic Wireless Settings Wireless Network. If you want to disable wireless networking, select Disable. Wireless Network Name. Enter the Wireless Network Name (SSID) into the field. The SSID is the network name shared among all devices in a wireless network. The SSID must be identical for all devices in the wireless network. It is case-sensitive and must not exceed 32 alphanumeric characters, which may be any keyboard character. Linksys recommends that you change the default SSID (linksys) to a unique name of your choice. Wireless Channel. Select the appropriate channel from the list provided to correspond with your network settings, between 1 and 11 (in North America). All devices in your wireless network must use the same channel in order to function correctly. Wireless Network Type. If you have Wireless-G and 802.11b devices in your network, then keep the default setting, Mixed. If you have only Wireless-G devices, select G-Only. If you want to disable wireless networking, select Disable. Current Encryption method will be listed. To save your changes on this page, click the Save Settings button. To cancel any unsaved changes on this page, click the Cancel Changes button. 31 Wireless-G Cable Gateway Wireless Security 64-Bit Encryption Figure 5-5 Wireless SSID Broadcast. When wireless clients survey the local area for wireless networks to associate with, they will detect the SSID broadcast by the Router. To broadcast the Router's SSID, keep the default setting, Enabled. If you do not want to broadcast the Router's SSID, then select Disabled. Wireless Encryption Level. An acronym for Wired Equivalent Privacy, WEP is an encryption method used to protect your wireless data communications. WEP uses 64-bit or 128-bit keys to provide access control to your network and encryption security for every data transmission. To decode data transmissions, all devices-Wireless-G and 802.11b-in a network must use an identical WEP key. Higher encryption levels offer higher levels of security, but due to the complexity of the encryption, they may decrease network performance. If you select 64-Bit Encryption, you will see the screen in Figure 5-6. If you select 128-Bit Encryption, you will see the screen in Figure 5-7. If you don’t want to use WEP security, select No Encryption. To save your changes on this page, click the Save Settings button. To cancel any unsaved changes on this page, click the Cancel Changes button. 32 Figure 5-6 Default Key. Select which WEP key (1-4) will be used when the Router sends data. Make sure the receiving device is using the same key. Passphrase for Keys. Instead of manually entering WEP keys, you can enter a Passphrase. This Passphrase is used to generate one or more WEP keys. It is case-sensitive and should not be longer than 16 alphanumeric characters. (This Passphrase function is compatible with Linksys wireless products only. If you want to communicate with non-Linksys wireless products, enter the WEP key manually on the non-Linksys wireless products.) After you enter the Passphrase, click the Generate button to create WEP keys. Wireless WEP Keys 1-4. WEP keys enable you to create an encryption scheme for wireless LAN transmissions. If you are not using a Passphrase, then manually enter a set of values. (Do not leave a key field blank, and do not enter all zeroes. These are not valid key values.) For 64-bit WEP encryption, the key must be exactly 10 hexadecimal characters in length. When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes. 33 Wireless-G Cable Gateway 128-Bit Encryption Wireless Network Access Figure 5-7 Figure 5-8 Default Key. Select which WEP key (1-4) will be used when the Router sends data. Make sure the receiving device is using the same key. Passphrase for Keys. Instead of manually entering WEP keys, you can enter a Passphrase. This Passphrase is used to generate one or more WEP keys. It is case-sensitive and should not be longer than 16 alphanumeric characters. (This Passphrase function is compatible with Linksys wireless products only. If you want to communicate with non-Linksys wireless products, enter the WEP key manually on the non-Linksys wireless products.) After you enter the Passphrase, click the Generate button to create WEP keys. Wireless WEP Keys 1-4. WEP keys enable you to create an encryption scheme for wireless LAN transmissions. If you are not using a Passphrase, then manually enter a set of values. (Do not leave a key field blank, and do not enter all zeroes. These are not valid key values.) For 128-bit WEP encryption, the key must be exactly 26 hexadecimal characters in length. Valid hexadecimal characters are “0”-“9” and “A”-“F”. Wireless Network Access. If this function is enabled, only the computers on the list will be allowed access to the wireless network. To add a computer to the network, click Enabled to enable the function. Then, enter the MAC address in the fields, and click the Select MAC Address From Networked Computers button, and the screen in Figure 5-9 will appear. When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes. 34 Figure 5-9 Select the MAC Address from the list, and click the Add button. Click the Refresh button if you want to refresh the screen. Click the Close button to return to the previous screen. When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes. 35 Wireless-G Cable Gateway Advanced Wireless Settings Advanced Wireless On this screen you can access the Advanced Wireless features of Basic Data Rates, Control Tx Rates, Beacon Interval, DTIM Interval, Fragmentation Threshold, RTS Threshold, and Authentication Type. Note - these adveance settings typically do not need to be modified. the next DTIM with a DTIM Interval value. Its clients hear the beacons and awaken to receive the broadcast and multicast messages. Fragmentation Threshold. This value should remain at its default setting of 2346. The range is 256-2346 bytes. It specifies the maximum size for a packet before data is fragmented into multiple packets. If you experience a high packet error rate, you may slightly decrease the Fragmentation Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor modifications of this value are recommended. RTS Threshold. This value should remain at its default setting of 2347. The range is 0-2347 bytes. Should you encounter inconsistent data flow, only minor modifications are recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS) frame to acknowledge the right to begin transmission. Figure 5-10 Basic Data Rates. Select Min or All from the drop-down menu for rate. Control Tx Rates. Select Min or All from the drop-down menu for the transmission rate. All will negotiate the best possible connection speed between the Router and a wireless client. Beacon Interval. The default value is 100. Enter a value between 1 and 65,535 milliseconds. The Beacon Interval value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize the wireless network. DTIM Interval The default value is 3. This value, between 1 and 255 milliseconds, indicates the interval of the Delivery Traffic Indication Message (DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages. When the Router has buffered broadcast or multicast messages for associated clients, it sends 36 Authentication Type. The default is set to Open System or Shared Key, which allows either Open System or Shared Key authentication to be used. For Open System authentication, the sender and the recipient do NOT use a WEP key for authentication. For Shared Key authentication, the sender and recipient use a WEP key for authentication. If you want to use only Shared Key authentication, then select Shared Key. When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes. 37 Wireless-G Cable Gateway The Security Tabs Firewall When you click the Security tab, you will see the Firewall screen (see Figure 5-11). This screen contains Filters and Block WAN Requests. Filters block specific internal users from accessing the Internet and block anonymous Internet requests and/or multicasting. Filter Multicast. Multicasting allows for multiple transmissions to specific recipients at the same time. If multicasting is permitted, then the Router will allow IP multicast packets to be forwarded to the appropriate computers. Select Enable to filter multicasting, or Disable to disable this feature. Block Anonymous Internet Requests. This keeps your network from being “pinged” or detected and reinforces your network security by hiding your network ports, so it is more difficult for intruders to work their way into your network. Select Enable to block anonymous Internet requests, or Disable to allow anonymous Internet requests. When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes. VPN Passthrough Virtual Private Networking (VPN) is a security measure that creates a secure connection between two remote locations by using specific settings. The VPN Passthrough screen, shown in Figure 5-12, allows you to configure your VPN settings to make your network more secure. Figure 5-11 Firewall Protection. To add Firewall Protection, click Enabled. If you do not want Firewall Protection, click Disabled. Filter Proxy. Use of WAN proxy servers may compromise the Router's security. Denying Filter Proxy will disable access to any WAN proxy servers. To enable proxy filtering, click Enabled. Filter Cookies. A cookie is data stored on your PC and used by Internet sites when you interact with them. To enable cookie filtering, click Enabled. Filter Java Applets. Java is a programming language for websites. If you deny Java Applets, you run the risk of not having access to Internet sites created using this programming language. To enable Java Applet filtering, click Enabled. Filter ActiveX. ActiveX is a programming language for websites. If you deny ActiveX, you run the risk of not having access to Internet sites created using this programming language. To enable ActiveX filtering, click Enabled. 38 Figure 5-12 IPSec Passthrough. Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. To allow IPSec Passthrough, click the Enabled button. To disable IPSec Passthrough, click the Disabled button. PPTP Passthrough. Point-to-Point Tunneling Protocol Passthrough is the method used to enable VPN sessions to a Windows NT 4.0 or 2000 server. To allow PPTP Passthrough, click the Enabled button. To disable PPTP Passthrough, click the Disabled button. When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes. 39 Wireless-G Cable Gateway The Access Restrictions Tabs Website Blocking The Access Restrictions tabs, shown in Figure 5-13, allow you allows you to block or allow specific kinds of Internet usage. Keyword Blocking. To block a keyword, click Enable. Enter a keyword in the New Keyword field, then click Add. To remove a keyword from being blocked, select the keyword from the Keyword List, then click Remove. Website Blocking. To block a website, click Enable. Then click Deny Websites in List. Enter the website address in the New Website field, then click Add. To remove a website from being blocked, select Allow Websites in List, select the website from the Website List, then click Remove. Scheduling. Select Always block or Block from and select a range of time and days. Timed Access This screen is used to add or remove access from a computer on your network by days and time. Figure 5-13 Figure 5-14 Add/Remove a Host. Click Enabled. To select a specific computer that you want to block or allow access, click Select MAC Address from Networked Computers, and the screen in Figure 5-15 will appear. 40 41 Wireless-G Cable Gateway Filter Internet Traffic This screen is used to filter Internet traffic by IP Address Range or by Port Range. Figure 5-15 Select the MAC Address from the list, click the Select button , and click the Add button. Click the Refresh button if you want to refresh the screen. Click the Close button to return to the previous screen. When you return to the Timed Access screen, the MAC Address will appear in the fields. Select a filter from the drop-down list, if desired, then click either the Add button, or the Remove button, as appropriate. Figure 5-16 Day to Block. You can select Everyday or specified days to block or allow. Filtering Rules. You can filter by IP Address Range or Port Range. Time to Block. You can select All day, or a range of time. IP Address Range To set up a filter using IP addresses, enter the range of IP addresses you wish to filter in the Start and End fields. Users who have filtered IP addresses will not be able to access the Internet at all. If you only want to filter one IP address instead of a range of IP addresses, enter the same value into both fields. For instance, if you wish to filter the PC with the IP address of 192.168.0.5, enter 5 into both fields on one line: 192.168.0.5 ~ 192.168.0.5. Port Range To filter users by network port number, select the protocol you want to filter, TCP, UDP, or Both, in the Protocol drop-down box. Enter the port numbers you want to filter in the Start and End fields. Users connected to the Router will no longer be able to access any port number listed there. When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes. 42 43 Wireless-G Cable Gateway The Applications & Gaming Tabs Figure 5-17 When you click the Applications & Gaming tab, you will see the Port Range Forwarding screen (see Figure 5-17). Port Range Forwarding sets up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized Internet applications. (Specialized Internet applications are any applications that use Internet access to perform functions such as videoconferencing or online gaming. Some Internet applications may not require any forwarding.) When users send this type of request to your network via the Internet, the Router will forward those requests to the appropriate PC. Before using Forwarding, you should assign a static IP address to the designated PC. Port Range Forwarding Figure 5-18 Port Range. To add a server using Port Range Forwarding, complete the following fields: Application. Enter the name of the application. Start and End. Enter the number or range of external ports(s) used by the server or Internet application. Check with the Internet application software documentation for more information. Protocol. Select the protocol TCP or UDP, or select Both. IP Address. Enter the IP address of the server that you want the Internet users to be able to access. To find the IP address, go to “Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter.” Enabled. Check the Enabled box to enable the services you have defined. Port Range Forwarding will not function if the Enabled button is left unchecked. This is disabled (unchecked) by default. If you need to forward all ports to one PC, click the DMZ tab. When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes. 44 45 Wireless-G Cable Gateway Port Triggering DMZ Figure 5-20 The DMZ screen allows one local user to be exposed to the Internet for use of a special-purpose service such as Internet gaming and videoconferencing. Whereas Port Range Forwarding can only forward a maximum of 10 ranges of ports, DMZ hosting forwards all the ports for one PC at the same time. Figure 5-19 The Port Triggering screen allows the Router to watch outgoing data for specific port numbers. The IP address of the computer that sends the matching data is remembered by the Router, so that when the requested data returns through the Router, the data is pulled back to the proper computer by way of IP address and port mapping rules. Port Triggering Application Enter the application name of the trigger. DMZ. To use this feature, select Enable. To disable DMZ hosting, select Disable. DMZ Host IP Address. To expose one PC, enter the computer’s IP address. To get the IP address of a computer, refer to “Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter.” When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes. Triggered Range For each application, list the triggered port number range. Check with the Internet application documentation for the port number(s) needed. Start Port Enter the starting port number of the Triggered Range. End Port Enter the ending port number of the Triggered Range. When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes. 46 47 Wireless-G Cable Gateway The Administration Tabs Diagnostics The Administration tabs contain Security, Diagnostics, and Advanced Administration screens. This screen allows you to run a Ping Test to determine if an IP Address is online. Figure 5-22 Figure 5-21 Security Security. To change your password, enter the Gateway Password in the (Enter New Password) field, then re-enter it in the (Re-enter To Confirm) field. Reporting E-mail Alerts. Click Enable to allow alerts. Your Email Address. Enter the E-mail adress that the alerts will be sent to. Your SMTP Server Name. Enter the name of your SMTP server in the field. Logs The log with the description, count, last occurrence, target, and source of the alert can be viewed here. To send the E-mail Log, click the E-mail Log button. To clear the log, click the Clear Log button. 48 When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes. Ping Test Ping Target. Enter the IP Address that you want to ping in the field. No. of Pings. Enter the number of times that you want to ping. Ping Size. Enter the size of the ping to send. Ping Interval. Enter the Ping Interval in Milliseconds. Ping Timeout. Enter the Timeout in Milliseconds. Click the Start Test button to start the Ping Test. Click the Abort Test button to stop the test. Click the Refresh button to refresh the screen and view the test results. Click the Clear Result button to remove the results from the test that are displayed in the window. 49 Wireless-G Cable Gateway Advanced The Status Tabs The Advanced screen allows you to restore the Router’s configuration to its factory default settings, and to enable routing and NAT. When you click the Status tab, you will see the Gateway screen (see Figure 630). It displays information about the Gateway and its settings. Figure 5-23 Advanced Administration Note: Do not restore the factory defaults unless you are having difficulties with the Gateway and have exhausted all other troubleshooting measures. Once the Gateway is reset, you will have to re-enter all of your configuration settings. Restore Factory Defaults. To clear all of the Gateway’s settings and reset them to its factory defaults, click Yes. Routing and NAT. Click Disable to disable all NAT and routing functions of the Cable Gateway, and allow only the cable modem function. The IP address of the device will change to 192.168.100.1. When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes. 50 Figure 5-24 Information Note: The information provided and buttons available may vary depending on the Gateway’s settings. Standard Specification Compliant. The specification is displayed here. Hardware Version. The current hardware version is displayed here. Sofware Version. The current software version is displayed here. Cable Modem MAC Address. The MAC Address of the cable modem is displayed here. Cable Modem Serial Number. The serial number of the cable modem is displayed here. CM certificate. The installation status of the CM certificate is displayed here. 51 Wireless-G Cable Gateway Status System Up Time. This indicates how long the Gateway has been active. Network Access. Thsi indicates whether access to the network has been achieved. WAN IP Address. This indicates the IP Address that is assigned to the cablemodem. WAN DHCP IP Address Lease. This indicates how long the lease is. WAN DHCP IP Expires. This indicates when the lease expires. Startup Procedure. The status and comments for Acquire Downstream Channel, Connectivity State, Boot State, and Security are displayed. Downstream Channel. The status of the downstream channel items of Lock Status, Modulation, Channel ID, Sybol rate, Downstream Power, and SNR, are displayed. Upstream Channel. The status of the upstream channel items of Lock Status, Modulation, Channel ID, Sybol rate, and Upstream Power, are displayed. Connect The status of the Gateway’s connections are displayed on this screen. Local Network Figure 5-26 DHCP Clients. The DHCP clients of your network are listed. Select the client, then click the Release button to remove the client from the lease. The current system time is displayed below. Figure 5-25 52 53 Wireless-G Cable Gateway Appendix A: Troubleshooting Common Problems and Solutions This section provides possible solutions to problems regarding the Cable Gateway’s installation and operation. If your situation is described here, the problem should be solved by applying the corresponding solution. If you can’t find an answer here, check the Linksys website at www.linksys.com. 1. The Cable Gateway is not working. • Verify that the Power cord and other network cables are plugged in. • Check the LAN and Cable Modem - Cable LEDs on the Cable Gateway’s front and verify that they are lit appropriately. • Check the settings on your PC. • Check the Cable Gateway’s settings. • Verify that your cable ISP has been given the correct MAC Address for the cable modem function. 54 4. The Cable Link LED will not go solid. • Verify that the coaxial cable is firmly plugged into the Cable Gateway’s cable port, with the other end plugged directly into the Cable wall jack. • Verify that your Cable account is active. • Verify that your cable ISP has been given the correct MAC Address for the cable modem function. 5. I can’t access the Internet from the Cable Gateway. • Check if both ends of the network cable and power adapter are properly connected. Check if the status LEDs on the front panel are functioning properly. • If using Windows 95, 98 or Me, check the TCP/IP setup on the client side. Run winipcfg by clicking on the Start button, selecting Run, and typing winipcfg in the Run field. Press Enter. The PC should have an IP address of 192.168.0.xxx (“xxx” is from 2 to 254.). The Subnet Mask is 255.255.255.0; the default gateway IP should be the Cable Gateway’s IP Address, and check that the DNS is correct. • Check the same setup values in the Cable Gateway’s Summary page. 2. I can’t connect to the Cable Gateway. • Verify that the Cable Gateway is properly installed; LAN connections are OK, and it is powered ON. • Make sure that your PC and the Cable Gateway are on the same network segment. If you are not sure, initiate the DHCP function, and let the PC get the IP address automatically. • Make sure that your PC is using an IP address within the default range of 192.168.0.2 to 192.168.0.254 and thus compatible with the Cable Gateway default IP Address of 192.168.0.1 • Also, the Subnet Mask should be set to 255.255.255.0 to match the Cable Gateway. For the Cable Gateway, you can check these settings by using Control Panel-Network to check the Properties for the TCP/IP protocol. 6. When I enter a URL or IP address, I get a time out error. • Check to see if your other PCs work. If they do, verify that your PC’s IP settings are correct (IP address, Subnet Mask, Default Gateway, and DNS) • If the PCs are configured correctly, but still not working, check the Cable Gateway. Make sure that it is connected and ON. Connect to it and check its settings. (If you cannot connect to it, check the LAN and power connections.) • If the Cable Gateway is configured correctly, check your Internet connection to see that it is working correctly. • Manually configure the TCP/IP with a DNS address provided by your ISP. 3. The Diag LED stays lit when it shouldn’t. • The Diag LED lights up when the device is first powered up. The system will boot up itself and check for proper operation. After finishing the checking procedure, the LED turns off to show the system is working fine. If the LED remains lit after this time, the device is not working properly. Contact your cable provider if this problem persists. What is the maximum number of IP addresses that the Cable Gateway will support? The Cable Gateway will support up to 253 IP addresses. Frequently Asked Questions Does the Cable Gateway support IPSec Pass-Through? Yes, it is a feature built into the Cable Gateway. Does the Cable Gateway support IPX or AppleTalk? No. TCP/IP is the only protocol standard for the Internet and has become the global standard for communications. IPX, a NetWare communications protocol used only to route messages from one node to another, and AppleTalk, a communications protocol used on Apple and Macintosh networks, can be used for LAN to LAN connections, but those protocols cannot connect from WAN to LAN. 55 Wireless-G Cable Gateway What is Network Address Translation and what is it used for? Network Address Translation (NAT) translates multiple IP addresses on the private LAN to one public address that is sent out to the Internet. This adds a level of security since the address of a PC connected to the private LAN is never transmitted on the Internet. Furthermore, NAT allows the Cable Gateway to be used with low cost Internet accounts, when only one TCP/IP address is provided by the ISP. The user may have many private addresses behind this single address provided by the ISP. How do I get Half-Life: Team Fortress to work with the Cable Gateway? The default client port for Half-Life is 27005. The computers on your LAN need to have “+clientport 2700x” added to the HL shortcut command line; the x would be 6, 7, 8, and on up. This lets multiple computers connect to the same server. One problem: Version 1.0.1.6 won’t let multiple computers with the same CD key connect at the same time, even if on the same LAN (not a problem with 1.0.1.3). As far as hosting games, the HL server does not need to be in the DMZ. Just forward port 27015 to the local IP address of the server computer. Does the Cable Gateway support any operating system other than Windows 95, 98, Me, NT, 2000, or XP? Yes, but Linksys does not, at this time, provide technical support for setup, configuration or troubleshooting of any non-Windows operating systems. USB features are only supported by Windows 98, Me, 2000, and XP. The web page hangs; downloads are corrupt, or nothing but junk characters are being displayed on the screen. What do I need to do? Force your Ethernet adapter to 10Mbps or half duplex mode, and turn off the “Auto-negotiate” feature of your Ethernet adapter as a temporary measure. (Please look at the Network Control Panel in your Ethernet adapter’s Advanced Properties tab.) Make sure that your proxy setting is disabled in the browser. Check our website at www.linksys.com for more information. Does the Cable Gateway support ICQ send file? Yes, with the following fix: click ICQ menu -> preference -> connections tab->, and check I am behind a firewall or proxy. Then set the firewall time-out to 80 seconds in the firewall setting. The Internet user can then send a file to a user behind the Cable Gateway. How do I get KaZaA to work with the Cable Gateway? KaZaA is fully compatible with the Cable Gateway, but you must make sure that, during installation, you select “no idea” when asked about your firewall selection. Set your proxy settings to “No Proxy Server” in your File>Preferences. I set up an Unreal Tournament Server, but others on the LAN cannot join. What do I need to do? If you have a dedicated Unreal Tournament server running, you need to create a static IP for each of the LAN computers and forward ports 7777, 7778, 7779, 7780, 7781, and 27900 to the IP address of the server. You can also use a port forwarding range of 7777 ~ 27900. If you want to use the UT Server Admin, forward another port (8080 usually works well but is used for remote admin. You may have to disable this.), and then in the [UWeb.WebServer] section of the server.ini file, set the ListenPort to 8080 (to match the mapped port above) and ServerName to the IP assigned to the Cable Gateway from your ISP. Can multiple gamers on the LAN get on one game server and play simultaneously with just one public IP address? It depends on which network game or what kind of game server you are using. For example, Unreal Tournament supports multi-login with one public IP. 56 If all else fails in the installation, what can I do? Reset the Cable Gateway by holding down the reset button until the Diag LED fully turns on and off. Will the Cable Gateway function in a Macintosh environment? Yes, but the Cable Gateway’s setup pages are accessible only through Internet Explorer v4.0 or Netscape Navigator v4.0 or higher for Macintosh. NOTE: Linksys does not provide technical support for Macintosh computers. With which type of firewall is the Cable Gateway equipped? The Cable Gateway uses NAT and TCP/IP port inspections. It also has SPI (Stateful Packet Inspection). I am not able to access the Cable Gateway’s web configuration screen. What can I do? You may have to remove the proxy settings on your Internet browser, e.g., Netscape Navigator or Internet Explorer. Or remove the dial-up settings on your browser. Check with your browser documentation. What is DMZ? Demilitarized Zone (DMZ) allows one IP address (computer) to be exposed to the Internet. Some applications require multiple TCP/IP ports to be open. It is recommended that you set your computer with a static IP if you want to use DMZ. If DMZ is used, does the exposed user share the public IP with the Cable Gateway? No. 57 Wireless-G Cable Gateway Does the Cable Gateway pass PPTP packets or actively route PPTP sessions? The Cable Gateway allows PPTP packets to pass through. Is the Cable Gateway cross-platform compatible? Any platform that supports Ethernet and TCP/IP is compatible with the Cable Gateway. How many ports can be simultaneously forwarded? Theoretically, the Cable Gateway can establish 520 sessions at the same time, but you can only forward 10 ranges of ports. Does the Cable Gateway replace a modem? Is there a cable modem in the Cable Gateway? Yes. The Cable Gateway has an integrated cable modem, so this product will replace your current cable modem. What are the Cable Gateway’s advanced features? The Cable Gateway’s advanced features include Filters, Forwarding, and DMZ host. Appendix B: Configuring Wireless Security in Windows XP Note: WEP Encryption is an additional data security measure and not essential for Gateway operation. An acronym for Wired Equivalent Privacy, WEP is an encryption scheme used to protect your wireless data communications. WEP uses a combination of 64bit or 128-bit keys to provide access control to your network and encryption security for every data transmission. To decode a data transmission, each point in a network must use an identical 64-bit or 128-bit key. Higher encryption levels mean higher levels of security, but due to the complexity of the encryption, they may mean decreased network performance. How do I get mIRC to work with the Cable Gateway? Set port forwarding to 113 for the computer on which you are using mIRC. If you are experiencing difficulty after setting the port forwarding, try changing the Direct Client-toClient (DCC) settings to a range from 1024 to 1030 on the DCC option and Forwarding page of the Web-based Setup Utility. You may also have heard the term “40-bit” used in conjunction with WEP Encryption. This is simply another term for 64-bit WEP encryption. This level of WEP encryption has been called 40-bit because it uses a 40-bit secret key along with a 24-bit Initialization Vector (40 + 24 = 64). Wireless vendors may use either name. Linksys uses the term “64-bit” when referring to this level of encryption. If your questions are not addressed here, refer to the contact information on the last page of this manual, or online at support.linksys.com. If possible, make sure your wireless network is functioning before attempting to configure WEP. A 128-bit WEP encrypted wireless network will NOT communicate with a 64bit WEP encrypted wireless network. Therefore, make sure that all of your wireless devices are using the same encryption level. All wireless devices complying with the 802.11b or 802.11g standard will support 64-bit WEP. Configure WEP in the Wireless Setup section of “Chapter 5: Using the Gateway’s Web-based Utility.” Go to Features Setup tab. Click on Wireless, then Setup. Use the WEP Key in the Key 1 field to configure WEP in Windows XP. 58 59 Wireless-G Cable Gateway The following steps will help you enable WEP and enter the encryption key manually for your wireless PC cards, in order to enable your Windows XP system to communicate with the Gateway wirelessly. 2. In the “Control Panel” window, click the Network and Internet Connections icon. These steps assume that you are running Windows XP in the default mode. Be sure you have the WEP Key generated in the Gateway, shown in the Key 1 field. 1. Click the Start button and go to the Control Panel. Figure B-2 3. Click on the Network Connections icon. Figure B-3 Figure B-1 4. The “Network Connections” window will appear. Under LAN or HighSpeed Internet you will see all Network cards that are installed and operating in your computer. Double-click the Wireless Network Connection icon associated with your wireless adapter. If the “Wireless Network Connection Status” window appears, continue to the next step. 60 61 Wireless-G Cable Gateway If a “Connect to Wireless Network” window appears, in the Available Networks section, click the desired wireless network, specified by the Gateway’s SSID. Then, double-click the Wireless Network Connection icon. Figure B-4 5. When the “Wireless Network Connection Status” window appears, click the Properties button. 6. When the “Wireless Network Connection Properties” window appears, click the Wireless Networks Tab. Figure B-6 7. If the appropriate wireless network, specified by the Gateway’s SSID, is displayed in the “Preferred networks” section, double-click it and continue to the next step. Otherwise, click on the appropriate wireless network, specified by the Gateway’s SSID, in the “Available networks” section. Then, click the Configure button. Figure B-5 62 Figure B-7 63 Wireless-G Cable Gateway 8. The “Wireless Network Properties” window will appear. Click the check box for the Data encryption (WEP enabled) option. Remove the check from the Network Authentication (Shared mode) and The key is provided for me automatically fields. Appendix C: Installing the TCP/IP Protocol In the "Network key" field, enter the exact Key (all 10 or 26 digits, depending on the level of encryption) generated by the Gateway. Follow these instructions to install the TCP/IP protocol on one of your PCs only after a network card has been successfully installed inside the PC. These instructions are for Windows 95, Windows 98, and Windows Me. For TCP/IP setup under Windows NT, 2000, and XP, see your Windows manual. Verify that the “Key format” field displays “Hexadecimal digits” and that the “Key length” field displays either “40 bits (10 digits)” or “104 bits (26 digits)”. If this is not displayed, you have entered the key incorrectly. 1. Click the Start button. Choose Settings and then Control Panel. 2. Double-click on the Network icon to bring up your Network window. Select the Configuration tab. Figure C-1 3. Click the Add button. Figure B-8 Click the OK button to save the settings. Click on OK buttons until you get back to the “Wireless Network Connection Status” window. Close any open windows to get back to the Windows XP desktop. 4. Double-click on Protocol. 5. Highlight Microsoft under the list of manufacturers. Close any applications and reboot your PC. After reboot, WEP configuration is complete and you should be able to connect wirelessly to the Gateway. 64 65 Wireless-G Cable Gateway 6. Find and double-click TCP/IP in the list to the right (see Figure C-2). Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter This section describes how to find the MAC address for your Ethernet adapter to do either MAC Filtering for the Gateway and ISP. You can also find the IP address of your computer’s Ethernet adapter. The IP address is used for filtering. Follow the steps in this appendix to find the MAC address or IP address for your adapter in Windows 95, 98, Me, NT, 2000, and XP. Figure C-2 7. After a few seconds, the main Network window will appear. The TCP/IP Protocol should now be listed. For Windows 95, 98, and Me: 1. Click on Start and Run. In the Open field, enter winipcfg. Then press the Enter key or the OK button. Figure D-1 2. When the IP Configuration window appears, select the Ethernet adapter you are using to connect to the Gateway via a CAT 5 Ethernet cable. Figure C-3 8. Click the OK button. Windows may ask for original Windows installation files. Supply them as needed, e.g., c:\windows\options\cabs, D:\win98, D:\win95. 9. Windows will ask you to restart the PC. Click the Yes button. The TCP/IP installation is now complete. Figure D-2 66 67 Wireless-G Cable Gateway 3. Write down the Adapter Address as shown on your computer screen (see Figure D-3). This is the MAC address for your Ethernet adapter and will be shown as a series of numbers and letters. 2. In the command prompt, enter ipconfig /all. Then press the Enter key. The MAC address/Adapter Address is what you will use for MAC Filtering. Figure D-3 The example in Figure D-3 shows the IP address of your Ethernet adapter as 192.168.1.100. Your computer may show something different. Note: The MAC address is also called the Adapter Address. For Windows NT, 2000, and XP: The following steps show an alternative way of obtaining the MAC address and IP address for your Ethernet adapter. 1. Click on Start and Run. In the Open field, enter cmd. Press the Enter key or click the OK button. Figure D-5 3. Write down the Physical Address as shown on your computer screen; it is the MAC address for your Ethernet adapter. This will appear as a series of letters and numbers. The MAC address/Physical Address is what you will use for MAC Filtering. Note: The MAC address is also called the Physical Address. The example in Figure D-5 shows the IP address of your Ethernet adapter as 192.168.1.100. Your computer may show something different. Figure D-4 68 69 Wireless-G Cable Gateway When entering the information using the Router’s web-based utility, you will type the 12-digit MAC address in this format, XXXXXXXXXXXX without the hyphens for MAC Filtering. Appendix E: Glossary 10BaseT - An Ethernet standard that uses twisted wire pairs. 100BaseTX - IEEE physical layer specification for 100 Mbps over two pairs of Category 5 UTP or STP wire. 802.11b - One of the IEEE standards for wireless networking hardware. Products that adhere to a specific IEEE standard will work with each other, even if they are manufactured by different companies. The 802.11b standard specifies a maximum data transfer rate of 11Mbps, an operating frequency of 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to as Wi-Fi networks. Adapter - Printed circuit board that plugs into a PC to add to capabilities or connectivity to a PC. In a networked environment, a network interface card (NIC) is the typical adapter that allows the PC or server to connect to the intranet and/or Internet. Figure D-6 Auto-negotiate - To automatically determine the correct settings. The term is often used with communications and networking. For example, Ethernet 10/100 cards, hubs and switches can determine the highest speed of the node they are connected to and adjust their transmission rate accordingly. Beacon Interval - A beacon is a packet broadcast by the Access Point to keep the network synchronized. A beacon includes the wireless LAN service area, the AP address, the Broadcast destination addresses, a time stamp, Delivery Traffic Indicator Maps, and the Traffic Indicator Message (TIM). Bit - A binary digit. The value - 0 or 1-used in the binary numbering system. Also, the smallest form of data. Boot - To cause the computer to start executing instructions. Personal computers contain built-in instructions in a ROM chip that are automatically executed on startup. These instructions search for the operating system, load it and pass control to it. 70 71 Wireless-G Cable Gateway Broadband - A data-transmission scheme in which multiple signals share the bandwidth of a medium. This allows the transmission of voice, data and video signals over a single medium. Cable television uses broadband techniques to deliver dozens of channels over one cable. Browser - A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web or PC. The word "browser" seems to have originated prior to the Web as a generic term for user interfaces that let you browse text files online. Buffer - A buffer is a shared or assigned memory area used by hardware devices or program processes that operate at different speeds or with different sets of priorities. The buffer allows each device or process to operate without being held up by the other. In order for a buffer to be effective, the size of the buffer and the algorithms for moving data into and out of the buffer need to be considered by the buffer designer. Like a cache, a buffer is a "midpoint holding place" but exists not so much to accelerate the speed of an activity as to support the coordination of separate activities. Cable Modem - A device that connects a computer to the cable television network, which in turn connects to the Internet. Once connected, cable modem users have a continuous connection to the Internet. Cable modems feature asymmetric transfer rates: around 36 Mbps downstream (from the Internet to the computer), and from 200 Kbps to 2 Mbps upstream (from the computer to the Internet). Category 5 - ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify "categories" (the singular is commonly referred to as "CAT") of twisted pair cabling systems (wires, junctions, and connectors) in terms of the data rates that they can sustain. CAT 5 cable has a maximum throughput of 100 Mbps and is usually utilized for 100BaseTX networks. Default Gateway - The routing device used to forward all traffic that is not addressed to a station within the local subnet. Denial of Service - A protocol that directs the network to no longer respond to requests that might arise as the result of a Denial of Service attack. DHCP (Dynamic Host Configuration Protocol) - A protocol that lets network administrators manage centrally and automate the assignment of Internet Protocol (IP) addresses in an organization's network. Using the Internet's set of protocol (TCP/IP), each machine that can connect to the Internet needs a unique IP address. When an organization sets up its computer users with a connection to the Internet, an IP address must be assigned to each machine. Without DHCP, the IP address must be entered manually at each computer and, if computers move to another location in another part of the network, a new IP address must be entered. DHCP lets a network administrator supervise and distribute IP addresses from a central point and automatically sends a new IP address when a computer is plugged into a different place in the network. DHCP uses the concept of a "lease" or amount of time that a given IP address will be valid for a computer. The lease time can vary depending on how long a user is likely to require the Internet connection at a particular location. It's especially useful in education and other environments where users change frequently. Using very short leases, DHCP can dynamically reconfigure networks in which there are more computers than there are available IP addresses. DHCP supports static addresses for computers containing Web servers that need a permanent IP address. DMZ (Demilitarized Zone) - Allows one IP address (or computer) to be exposed to the Internet. Some applications require multiple TCP/IP ports to be open. It is recommended that you set your computer with a static IP address if you want to use DMZ Hosting. DNS - The domain name system (DNS) is the way that Internet domain name are located and translated into Internet Protocol (IP) addresses. A domain name is a meaningful and easy-to-remember "handle" for an Internet address. Domain - A subnetwork comprised of a group of clients and servers under the control of one security database. Dividing LANs into domains improves performance and security. Download - To receive a file transmitted over a network. In a communications session, download means receive, upload means transmit. Denial of Service Attack - An assault on a network that floods it with so many additional requests that regular traffic is either slowed or completely interrupted. 72 73 Wireless-G Cable Gateway DTIM (Delivery Traffic Indication Message) - A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages. When the AP has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. AP Clients hear the beacons and awaken to receive the broadcast and multicast messages. FTP (File Transfer Protocol) - A protocol used to transfer files over a TCP/IP network (Internet, UNIX, etc.). For example, after developing the HTML pages for a Web site on a local machine, they are typically uploaded to the Web server using FTP. Dynamic IP Address - An IP address that is automatically assigned to a client station in a TCP/IP network, typically by a DHCP server. Network devices that serve multiple users, such as servers and printers, are usually assigned static IP addresses. FTP includes functions to log onto the network, list directories and copy files. It can also convert between the ASCII and EBCDIC character codes. FTP operations can be performed by typing commands at a command prompt or via an FTP utility running under a graphical interface such as Windows. FTP transfers can also be initiated from within a Web browser by entering the URL preceded with ftp://. Encryption - A security method that applies a specific algorithm to data in order to alter the data's appearance and prevent other devices from reading the information. Unlike e-mail programs in which graphics and program files have to be "attached," FTP is designed to handle binary files directly and does not add the overhead of encoding and decoding the data. Ethernet - IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium. Has a transfer rate of 10 Mbps. Forms the underlying transport vehicle used by several upper-level protocols, including TCP/IP and XNS. Full Duplex - The ability of a device or line to transmit data simultaneously in both directions. Firewall - A firewall is a set of related programs, located at a network gateway server, that protects the resources of a network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources to which its own users have access. Basically, a firewall, working closely with a router, examines each network packet to determine whether to forward it toward its destination. Firmware - Code that is written onto read-only memory (ROM) or programmable read-only memory (PROM). Once firmware has been written onto the ROM or PROM, it is retained even when the device is turned off. Fragmentation - Breaking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet. Gateway - A device that interconnects networks with different, incompatible communications protocols. Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a time. Hardware - Hardware is the physical aspect of computers, telecommunications, and other information technology devices. The term arose as a way to distinguish the "box" and the electronic circuitry and components of a computer from the program you put in it to make it do things. The program came to be known as the software. Hub - The device that serves as the central location for attaching wires from workstations. Can be passive, where there is no amplification of the signals; or active, where the hubs are used like repeaters to provide an extension of the cable that connects to a workstation. ICQ - A conferencing program for the Internet that provides interactive chat, e-mail and file transfer and can alert you when someone on your predefined list has also come online. IEEE (The Institute of Electrical and Electronics Engineers) - The IEEE describes itself as "the world's largest technical professional society, promoting 74 75 Wireless-G Cable Gateway the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members." The IEEE fosters the development of standards that often become national and international standards. The organization publishes a number of journals, has many local chapters, and several large societies in special areas, such as the IEEE Computer Society. IP (Internet Protocol) - The method or protocol by which data is sent from one computer to another on the Internet. It is a standard set of rules, procedures, or conventions relating to the format and timing of data transmission between two computers that they must accept and use to be able to understand each other. IP Address - In the most widely installed level of the Internet Protocol (IP) today, an IP address is a 32-binary digit number that identifies each sender or receiver of information that is sent in packet across the Internet. When you request an HTML page or send e-mail, the Internet Protocol part of TCP/IP includes your IP address in the message (actually, in each of the packets if more than one is required) and sends it to the IP address that is obtained by looking up the domain name in the Uniform Resource Locator you requested or in the e-mail address you're sending a note to. At the other end, the recipient can see the IP address of the Web page requestor or the e-mail sender and can respond by sending another message using the IP address it received. IPSec (Internet Protocol Security) - A suite of protocols used to implement secure exchange of packets at the IP layer. IPSec supports two basic modes: Transport and Tunnel. Transport encrypts the payload of each packet, leaving the header untouched, while Tunnel mode encrypts both the header and the payload and is therefore more secure. IPSec must be supported on both transmitter and receiver and must share a public key. Tunnel mode is widely deployed in VPNs (Virtual Private Networks). IPX (Internetwork Packet EXchange) - A NetWare communications protocol used to route messages from one node to another. IPX packets include network addresses and can be routed from one network to another. ISP (Internet Service Provider) - A company that provides individuals and companies access to the Internet and other related services such as Web site building and virtual hosting. 76 LAN (local area network) - A group of computers and associated devices that share a common communications line and typically share the resources of a single processor or server within a small geographic area (for example, within an office building). MAC (Media Access Control) Address - A unique number assigned by the manufacturer to any Ethernet networking device, such as a network adapter, that allows the network to identify it at the hardware level. Mbps (Megabits per second) - One million bits per second; unit of measurement for data transmission. mIRC - mIRC runs under Windows and provides a graphical interface for logging onto IRC servers and listing, joining and leaving channels. Multicasting - Sending data to a group of nodes instead of a single destination. Network - A system that transmits any combination of voice, video and/or data between users. NIC (Network Interface Card) - A board installed in a computer system, usually a PC, to provide network communication capabilities to and from that computer system. Also called an adapter. Node - A network junction or connection point, typically a computer or work station. Notebook (PC) - A notebook computer is a battery-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices, and at meetings. A notebook computer, sometimes called a laptop computer, typically weighs less than five pounds and is three inches or less in thickness. Packet - A unit of data routed between an origin and a destination in a network. Packet Filtering - Discarding unwanted network traffic based on its originating address or range of addresses or its type (e-mail, file transfer, etc.). PC Card - A credit-card sized removable module that contains memory, I/O, or a hard disk. 77 Wireless-G Cable Gateway Port - A pathway into and out of the computer or a network device such as a switch or router. For example, the serial and parallel ports on a personal computer are external sockets for plugging in communications lines, modems and printers. PPTP (Point-to-Point Tunneling Protocol) - A protocol which allows the Point to Point Protocol (PPP) to be tunneled through an IP network. PPTP does not specify any changes to the PPP protocol but rather describes a "tunneling service" for carrying PPP (a tunneling service is any network service enabled by tunneling protocols such as PPTP, L2F, L2TP, and IPSEC tunnel mode). One example of a tunneling service is secure access from a remote small office network to a headquarters corporate intranet via a Virtual Private Network (VPN) that traverses the Internet. However, tunneling services are not restricted to corporate environments and may also be used for personal (i.e., non-business) applications. RJ-11 (Registered Jack-11) - A telephone connector that holds up to six wires. The RJ-11 the common connector used to plug a telephone into a wall. RJ-45 (Registered Jack-45) - A connector similar to a telephone connector that holds up to eight wires, used for connecting Ethernet devices. Router - Protocol-dependent device that connects subnetworks together. Routers are useful in breaking down a very large network into smaller subnetworks; they introduce longer delays and typically have much lower throughput rates than bridges. RTS (Request To Send) - An RS-232 signal sent from the transmitting station to the receiving station requesting permission to transmit. Server - Any computer whose function in a network is to provide user access to files, printing, communications, and other services. Software - Instructions for the computer. A series of instructions that performs a particular task is called a "program." The two major categories of software are "system software" and "application software." System software is made up of control programs such as the operating system and database management system (DBMS). Application software is any program that processes data for the user. SPI (Stateful Packet Inspection) - A firewall technology that monitors the state of the transaction so that it can verify that the destination of an inbound packet matches the source of a previous outbound request. It examines not just the headers of the packet, but also the contents, to determine more about the packet than just its source and destination information. It is called "stateful" because verifies that the stated destination computer has previously requested the current communication. In this way, it verifies that all communications are initiated by the recipient computer and are taking place only with sources that are known and trusted from previous interactions. In addition to being a more rigorous inspection, stateful packet inspection closes off ports until connection to the specific port is requested. This allows an added layer of protection from the threat of port scanning. SSID (Service Set IDentifier) - A unique name shared among all points in a wireless network. The SSID must be identical for each point in the wireless network and is case-sensitive. Static IP Address - A permanent IP address that is assigned to a node in an IP or a TCP/IP network. STP (Shielded Twisted Pair) - Telephone wire that is wrapped in a metal sheath to eliminate external interference. Subnet Mask - The method used for splitting IP networks into a series of subgroups, or subnets. The mask is a binary pattern that is matched up with the IP address to turn part of the host ID address field into a field for subnets. Switch - 1. A data switch connects computing devices to host computers, allowing a large number of devices to share a limited number of ports. 2. A device for making, breaking, or changing the connections in an electrical circuit. TCP (Transmission Control Protocol) - A method (protocol) used along with the IP (Internet Protocol) to send data in the form of message units (datagram) between network devices over a LAN or WAN. While IP takes care of handling the actual delivery of the data (routing), TCP takes care of keeping track of the individual units of data (called packets) that a message is divided into for efficient delivery over the network. TCP is known as a "connection oriented" protocol due to requiring the receiver of a packet to return an acknowledgment of receipt to the sender of the packet resulting in transmission control. A common misconception is that software is data. It is not. Software tells the hardware how to process the data. 78 79 Wireless-G Cable Gateway TCP/IP (Transmission Control Protocol/Internet Protocol) - The basic communication language or set of protocols for communications over a network (developed specifically for the Internet). TCP/IP defines a suite or group of protocols and not only TCP and IP. Throughput - The amount of data moved successfully from one place to another in a given time period. WAN (Wide Area Network)- A communications network that covers a relatively large geographic area, consisting of two or more LANs. Broadband communication over the WAN is often through public networks such as the telephone (DSL) or cable systems, or through leased lines or satellites. In its most basic definition, the Internet could be considered a WAN. WEP (Wired Equivalent Privacy) - A data privacy mechanism based on a 64bit or 128-bit shared key algorithm, as described in the IEEE 802.11 standard. TX Rate - Transmission Rate. Upgrade - To replace existing software or firmware with a newer version. Upload - To transmit a file over a network. In a communications session, upload means transmit, download means receive. WINIPCFG - Configuration utility based on the Win32 API for querying, defining and managing IP addresses within a network. A commonly used utility for configuring networks with static IP addresses. WLAN (Wireless Local Area Network) - A group of computers and associated devices that communicate with each other wirelessly. URL (Uniform Resource Locator) - The address that defines the route to a file on the Web or any other Internet facility. URLs are typed into the browser to access Web pages, and URLs are embedded within the pages themselves to provide the hypertext links to other pages. USB (Universal Serial Bus) - A "plug-and-play" interface between a computer and peripherals, such as digital cameras, scanners, game controllers, speakers, keyboards, portable data storage, or printers. With USB, you can add a new peripheral to your computer without having to add an adapter card or powering down the computer. USB also supports hot-swapping, the addition or removal of devices while the computer is running. USB 1.1-compliant devices support data rates of 1.5Mbps (low-speed) and up to 12Mbps (full-speed). USB 2.0-compliant devices are backward compatible with earlier USB devices, and they support data rates of 1.5Mbps (low-speed), 12Mbps (full-speed), and up to 480Mbps (high-speed). UTP - Unshielded twisted pair is the most common kind of copper telephone wiring. Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company. To reduce crosstalk or electromagnetic induction between pairs of wires, two insulated copper wires are twisted around each other. Each signal on twisted pair requires both wires. Since some telephone sets or desktop locations require multiple connections, twisted pair is sometimes installed in two or more pairs, all within a single cable. 80 81 Wireless-G Cable Gateway Appendix F: Specifications 82 Model Number WCG200 Standards DOCSIS 1.0, DOCSIS 1.1, DOCSIS 2.0, IEEE 802.11g, IEEE 802.11b. Ports 4 RJ-45 10/100, 1 USB, 1 Female Coax F-Connector Buttons Power ON/OFF switch, Reset Environmental Dimensions: 7.32" x 2.48" x 6.08" (186 mm x 63 mm x 154.5 mm) Unit Weight: 1.5 lb. (0.68 kg) Power: 12VDC, 1A Certifications: DOCSIS 1.1, DOCSIS 2.0, FCC Part 15B Class B, UL 1950, EN60950, CE EN 55022 Class B, VCCI, IC-03 Operating Temp.: 0ºC to 40ºC (32ºF to 104ºF) Cabling Type Cable LAN USB Coaxial UTP Category 5 or better Type B USB Storage Temp.: -20°C-70°C (-4°F-158°F) Operating Humidity: 20% to 90%, Non-Condensing LEDs Power, Cable, Activity, Ethernet, USB, Wireless Storage Humidity: 20% to 90%, Non-Condensing Security WEP, MAC address filtering, SPI Firewall 83 Wireless-G Cable Gateway Appendix H: Contact Information Appendix G: Warranty Information For help with the installation or operation of the Cable Gateway, contact Linksys Technical Support at one of the phone numbers or Internet addresses below. LIMITED WARRANTY Linksys warrants to You that, for a period of three years (the “Warranty Period”), your Linksys Product will be substantially free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates. This limited warranty extends only to the original purchaser. For help with the installation or operation of this product, contact Linksys Technical Support at one of the phone numbers or Internet addresses below. If the Product proves defective during the Warranty Period call Linksys Technical Support in order to obtain a Return Authorization Number, if applicable. BE SURE TO HAVE YOUR PROOF OF PURCHASE ON HAND WHEN CALLING. If You are requested to return the Product, mark the Return Authorization Number clearly on the outside of the package and include a copy of your original proof of purchase. RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE. You are responsible for shipping defective Products to Linksys. Linksys pays for UPS Ground shipping from Linksys back to You only. Customers located outside of the United States of America and Canada are responsible for all shipping and handling charges. Sales Information Technical Support RMA (Return Merchandise Authorization) Issues Fax Email Web FTP Site ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO THE DURATION OF THE WARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED. Some jurisdictions do not allow limitations on how long an implied warranty lasts, so the above limitation may not apply to You. This warranty gives You specific legal rights, and You may also have other rights which vary by jurisdiction. 800-546-5797 (LINKSYS) 800-326-7114* www.linksys.com (or call 949-271-5461) 949-265-6655 support@linksys.com http://www.linksys.com ftp.linksys.com * Before phoning Technical Support, try rebooting the Cable Gateway, as shown in “Chapter 2: Getting to Know the Cable Gateway” under the heading “Rebooting the Cable Gateway”. Also, make sure that you have contacted your ISP with your MAC Address to activate your account, as shown in “Chapter 3: Connecting the Cable Gateway.” This warranty does not apply if the Product (a) has been altered, except by Linksys, (b) has not been installed, operated, repaired, or maintained in accordance with instructions supplied by Linksys, or (c) has been subjected to abnormal physical or electrical stress, misuse, negligence, or accident. In addition, due to the continual development of new techniques for intruding upon and attacking networks, Linksys does not warrant that the Product will be free of vulnerability to intrusion or attack. TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL LINKSYS’LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. The foregoing limitations will apply even if any warranty or remedy provided under this Agreement fails of its essential purpose. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to You. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. 84 85 85 www.linksys.com © Copyright 2003 Linksys, All Rights Reserved.
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Create Date : 2003:08:11 20:08:35Z Modify Date : 2003:10:21 14:29:05-07:00 Page Count : 47 Creation Date : 2003:08:11 20:08:35Z Mod Date : 2003:10:21 14:29:05-07:00 Producer : Acrobat Distiller 5.0.5 (Windows) Author : rebecca Metadata Date : 2003:10:21 14:29:05-07:00 Creator : rebecca Title : WCG200-ug-30811A.qxdEXIF Metadata provided by EXIF.tools